Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
navigator vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2004-1160
Netscape 7.x to 7.2, and possibly other versions, allows remote malicious users to spoof arbitrary web sites by injecting content from one window into a target window whose name is known but resides in a different domain, as demonstrated using a pop-up window on a trusted web sit...
Netscape Navigator 7.0
Netscape Navigator 7.0.2
Netscape Navigator 7.2
Netscape Navigator 7.1
7.5
CVSSv2
CVE-2004-0718
The (1) Mozilla 1.6, (2) Firebird 0.7, (3) Firefox 0.8, and (4) Netscape 7.1 web browsers do not properly prevent a frame in one domain from injecting content into a frame that belongs to another domain, which facilitates web site spoofing and other attacks, aka the frame injecti...
Firebirdsql Firebird 0.7
Mozilla Mozilla 1.6
Netscape Navigator 7.1
7.5
CVSSv2
CVE-2003-0553
Buffer overflow in the Client Detection Tool (CDT) plugin (npcdt.dll) for Netscape 7.02 allows remote malicious users to execute arbitrary code via an attachment with a long filename.
Netscape Navigator 7.0.2
7.5
CVSSv2
CVE-2002-2061
Heap-based buffer overflow in Netscape 6.2.3 and Mozilla 1.0 and previous versions allows remote malicious users to crash client browsers and execute arbitrary code via a PNG image with large width and height values and an 8-bit or 16-bit alpha channel.
Mozilla Mozilla
Netscape Navigator 6.2.3
7.5
CVSSv2
CVE-2002-1308
Heap-based buffer overflow in Netscape and Mozilla allows remote malicious users to execute arbitrary code via a jar: URL that references a malformed .jar file, which overflows a buffer during decompression.
Mozilla Mozilla 1.0
Mozilla Mozilla 1.0.1
Mozilla Mozilla 1.1
Netscape Navigator 6.2
Netscape Navigator 6.2.1
Mozilla Mozilla 0.9.8
Mozilla Mozilla 0.9.9
Netscape Navigator 7.0
Mozilla Mozilla 0.9.6
Mozilla Mozilla 0.9.7
Netscape Navigator 6.2.2
Netscape Navigator 6.2.3
7.5
CVSSv2
CVE-2002-1091
Netscape 6.2.3 and previous versions, and Mozilla 1.0.1, allow remote malicious users to corrupt heap memory and execute arbitrary code via a GIF image with a zero width.
Mozilla Mozilla 0.9.9
Mozilla Mozilla 1.0
Opera Software Opera Web Browser 6.0.1
Mozilla Mozilla 0.9.5
Mozilla Mozilla 0.9.6
Netscape Navigator 6.2.2
Netscape Navigator 6.2.3
Mozilla Mozilla 0.9.7
Mozilla Mozilla 0.9.8
Opera Software Opera Web Browser 5.12
Opera Software Opera Web Browser 6.0
Netscape Navigator 6.2
Netscape Navigator 6.2.1
7.5
CVSSv2
CVE-2002-0815
The Javascript "Same Origin Policy" (SOP), as implemented in (1) Netscape, (2) Mozilla, and (3) Internet Explorer, allows a remote web server to access HTTP and SOAP/XML content from restricted sites by mapping the malicious server's parent DNS domain name to the r...
Mozilla Mozilla
Netscape Navigator
Microsoft Internet Explorer 6.0.2900
7.5
CVSSv2
CVE-2002-0593
Buffer overflow in Netscape 6 and Mozilla 1.0 RC1 and previous versions allows remote malicious users to cause a denial of service (crash) and possibly execute arbitrary code via a long channel name in an IRC URI.
Mozilla Mozilla 1.0
Netscape Navigator 6.0
Netscape Navigator 6.01
Mozilla Mozilla 0.9.9
Netscape Communicator 6.1
7.5
CVSSv2
CVE-2001-0847
Lotus Domino Web Server 5.x allows remote malicious users to gain sensitive information by accessing the default navigator $defaultNav via (1) URL encoding the request, or (2) directly requesting the ReplicaID.
Lotus Domino Web Server 5.x
7.5
CVSSv2
CVE-2001-0737
A long 'synch' delay in Logitech wireless mice and keyboard receivers allows a remote malicious user to hijack connections via a man-in-the-middle attack.
Logitech Cordless Freedom
Logitech Cordless Itouch Keyboard
Logitech Cordless Freedom Navigator
Logitech Cordless Freedom Pro
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
path traversal
CVE-2024-26978
CVE-2024-26982
wireless
CVE-2023-6949
CVE-2024-26980
CVE-2024-32766
CVE-2024-26939
cache poisoning
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »